LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

HOWTO: Configuring Proxy Access for the Entra Connector

Expand / Collapse


This article applies to:

  • MailMarshal 11.2 and above
  • Entra Connector

Question:

  • How do I configure a proxy for the Entra Connector?

Procedure:

The Entra Connector uses the MailMarshal RPC Proxy service to connect to Entra ID.  This service does not use the proxy settings configured in the MailMarshal Console.

To configure a proxy for the Entra Connector, use the https_proxy system environment variable.

You can provide a server name or IP address, port number, and optional authentication details.

The format is: setx https_proxy [protocol][<uid:pwd@>]<proxyserver>:<proxyport> /M 

  1. On the Array Manager server, open an elevated command prompt.
  2. Enter a setx command similar to the following examples:
    • setx https_proxy myproxyserver:8081 /M
    • setx https_proxy https://myv2proxy.local:80 /M
    • setx https_proxy mydomain\mmentrauser:supersecretpassword@10.10.10.10:8080 /M
  3. The expected response is: SUCCESS: Specified value was saved.
  4. Restart the MailMarshal RPC Proxy service. This will also restart the MailMarshal Array Manager service.
  5. Test the Entra connector. Any issues display as a red "toast" pop-up message in the console, and also in the MMRPCProxy log file.

Notes:

Other applications on the server that make automated web requests might respect the https_proxy variable. You can use the no_proxy variable to exclude sites from proxying.

If you are using a proxy that inspects HTTPS content (for example WebMarshal), you must exclude the following sites from inspection:

  • https://login.microsoftonline.com
  • https://graph.microsoft.com
This exclusion is to avoid issues with certificate validation. 
You only need to exclude the specific requests made by the Entra connector. For example:
  • Exclude the MailMarshal Array Manager IP address
  • If authenticating as a user, exclude the specific user configured


To contact Trustwave about this article or to request support:


Rate this Article:
     

Related Articles



Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.